setup.exe

FUSION INSTALL

The Fusion Installer, which is a variant of Adknowledge's download manager bundles a number of ad-supported offerings in the installer. The application setup.exe, “Fusion Install ” by FUSION INSTALL has been detected as adware by 38 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from install.oinstaller6.com.
Publisher:
Fusion Install   (signed by FUSION INSTALL)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
14b9408367ba6f9acfa29106a53860df

SHA-1:
1b60dce15dc5711fc877c9488c4b03adedb03b34

SHA-256:
4a052f40c4853adb24e874812f16afef3dddbff71e23bf282fccf3ebc6f0bf0e

Scanner detections:
38 / 68

Status:
Adware

Explanation:
This setup/installer bundles various adware components (toolbars, coupon extensions, ad-supported extensions and utility offers).

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/25/2024 10:14:47 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.593289
377

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Buzus
2014.02.09

Avira AntiVirus
Adware/iBryte.M
7.11.130.82

avast!
Malware-gen
2014.9-160124

AVG
Adware Generic5
2017.0.2855

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.16124

Bitdefender
Application.Generic.593289
1.0.20.120

Clam AntiVirus
Win.Adware.Agent-6916
0.98/19168

Comodo Security
Application.Win32.iBryte.R
17759

Dr.Web
Trojan.Packed.25441
9.0.1.024

Emsisoft Anti-Malware
Gen:Variant.Symmi.38436
8.16.01.24.10

ESET NOD32
Win32/AdWare.iBryte (variant)
10.9400

Fortinet FortiGate
Riskware/IBryte
1/24/2016

F-Prot
W32/Backdoor2.HTKO
v6.4.7.1.166

F-Secure
Application.Generic.593289
11.2016-24-01_1

G Data
Win32.Application.OptimumInstaller
16.1.24

IKARUS anti.virus
Win32.AdWare
t3scan.2.2.29

K7 AntiVirus
Adware
13.176.11595

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.768

Malwarebytes
v2016.01.24.10

McAfee
Artemis!5032EA165D47
5600.6511

MicroWorld eScan
Application.Generic.593289
17.0.0.72

NANO AntiVirus
Trojan.Win32.Buzus.ctabuf
0.28.0.57630

nProtect
Trojan-Clicker/W32.iBryte.555816
14.05.09.01

Panda Antivirus
16.01.24.10

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
1.16.14.00

Reason Heuristics
PUP.Adknowledge.FUSIONINSTALL.Installer (M)
16.1.24.10

Rising Antivirus
PE:PUF.PremiumInstaller!1.9F73
23.00.65.16122

Total Defense
Win32/Tnega.SRDMYD
37.0.10849

Trend Micro House Call
TROJ_GEN.F47V0127
7.2.24

Trend Micro
TROJ_BUZUS_DD30051C.UVPA
10.465.24

Vba32 AntiVirus
SScope.Malware-Cryptor.iBryte
3.12.24.3

VIPRE Antivirus
Optimum Installer
26304

Zillya! Antivirus
Trojan.Buzus.Win32.120232
2.0.0.1771

File size:
1.6 MB (1,702,184 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 7:00:00 PM

Valid to:
9/20/2014 6:59:59 PM

Subject:
CN=FUSION INSTALL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=FUSION INSTALL, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3615E290FD8B112928257EE3CD74B519

File PE Metadata
Compilation timestamp:
2/6/2014 10:21:43 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:5W4vfo3Rz1sWsuzT6XjfAjvCi3y9HpX3kkYFmo7hNhW9IPCqXatQx16gTv/V/J:5W4vfo3x1tTP3iBpXsgI1y816gTv/VB

Entry address:
0x38225

Entry point:
E8, DA, 8E, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 28, 7D, 47, 00, E8, C1, 35, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 78, A2, 59, 00, 77, 22, 6A, 04, E8, DD, 90, 00, 00, 59, 83, 65, FC, 00, 56, E8, 3F, 9E, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, CD, 35, 00, 00, C3, 6A, 04, E8, C0, 8F, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, B4, 8E, 59, 00, 00, 75, 18, E8, 15, 84, 00, 00, 6A, 1E, E8, 3D, 82, 00, 00, 68, FF, 00, 00, 00, E8, D7, 4C, 00, 00, 59, 59, A1...
 
[+]

Entropy:
7.0907

Code size:
401.5 KB (411,136 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security